• NewNewAugustEast@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    11 days ago

    That verified if their backups were end to end encrypted though right?

    It’s also interesting what was out of scope:

    Limitations
    The following components were not in scope; NCC Group was therefore unable to evaluate and identify issues with them:
    • Third-party and proprietary HSM vendor implementation.
    • Backup encryption implementation.
    • Side-channels in the access, creation, modification and deletion of backup data on third-party cloud storage.

    • youmaynotknow@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      11 days ago

      Dude, you seem to be under the impression that I’m somehow defending meta, and you’re evidently in battle mode. I said my piece, provided the evidence as requested. I guess this is where I drop off of this convoy for ith you, buddy. Make of it what you will. Have a good day.

      • NewNewAugustEast@lemmy.zip
        link
        fedilink
        arrow-up
        0
        ·
        11 days ago

        No, I am not in battle mode. I just read the link and found it interesting and responded with things I saw in it.

        What I didn’t do, was realize you sent TWO links, and I failed to read the second one. But believe me I am not trying to argue in any way. I am just responding.

        The second link was also just for backups.

        Again, I am just saying that they are not able to demonstrate that they are actually implementing this, AND that both of those links are for backups only. Thats all.